For Week 10, be sure to understand both information from the PDF as well as the slide show.
From the slides:
Different types of servers
The two different types of signals. (Analog vs Digital.)
What bandwith is and how it works (Plumbing pipes example)
Sendin information and how packets work
What a packet is
What happens as it's sent across a network
How the data finishes transmitting.
The two ways of sending data
What repeaters do
Protocols and how they work
What is an IP address made of and what does it represent
ALL keywords and definitions from the slides.
Notable Examples:
VPN A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network
Wireless N
Backbone a larger transmission line that carries data gathered from smaller lines that interconnect with it.
Router a device or, in some cases, software in a computer, that determines the next network point to which apacket should be forwarded toward its destination.
Relevance connected to the matter at hand
Torrent
Packet Jam
Buffer Overflow A buffer overflow occurs when a program or process tries to store more data in a buffer(temporary data storage area) than it was intended to hold
Logic Bomb also called slag code, is programming code, inserted surreptitiously or intentionally, that is designed to execute (or "explode") under circumstances such as the lapse of a certain amount of time or the failure of a a program user to respond to a program command.
Social Engineering a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.
Strong Passwords is one that is designed to be hard for a person or program to discover.
Confidentiality a set of rules or a promise that limits access or places restrictions on certain types of information.
Authentication the process of determining whether someone or something is, in fact, who or what it is declared to be.
Wireless G
Switch a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
Internet 2 a collaboration among more than 100 U.S. universities to develop networking and advanced applications for learning and research.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the basic communication language or protocol of the Internet.
Popularity the favor of the general public
Broadband refers to telecommunication in which a wide band of frequencies is available to transmit information.
IP address The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet
Virus a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.
Firewall A firewall is a set of related programs, located at a network gatewayserver, that protects the resources of a private network from users from other networks.
Spam is unsolicited e-mail on the Internet
PKI A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
Integrity is the assurance that information can only be accessed or modified by those authorized to do so.
DNS The domain name system (DNS) is the way that Internet domain names are located and translated intoInternet Protocol addresses.
Hub is the central part of a wheel where the spokes come together. is a place of convergence where data arrives from one or more directions and is forwarded out in one or more other directions.
LAN A local area network (LAN) is a group of computers and associated devices that share a common communications line or wireless link.
NLR
FTP File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet
Bit is the smallest unit of data in a computer.
P2P On the Internet, peer-to-peer (referred to as P2P) is a type of transient Internet network that allows a group of computer users with the same networking program to connect with each other and directly access files from one another's hard drives.
Cookie A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.records your preferences when using a particular site
Things from the PDF of import:
Protocols - rules that ensure the orderly and accurate transmission and reception of data; start and end transmission, recognize error, sent data at the appropriate speed, and identify the correct senders and recipients
Handshaking - protocols helps help network devices negotiate and establish communications
Packets - the process by which you send a file or an e-mail over a network,the file is actually broken up into small pieces. It is a "parcel" of dad that is sent across a computer network
Packet Switching - the technology of dividing a message into several packets that can be routed or independently to their destination to avoid out-of-service or congested links
Circuit Switching - establishes a dedicated, private link between one telephone and another for the duration of a call; more efficient alternative to circuit switching
TCP/IP (Transmission Control Protocol/Internet Protocol) - breaks messages into packets and addresses them for the transmission over the Internet
HTTP (Hypertext Transfer Protocol) - Exchanges information over the web
FTP (File Transfer Protocol) - Transfers files between local and remote host computers
POP (Post Office Protocol) - Transfers mail from an e-mail server to a client inbox
SMTP (Simple Mail Transfer Protocol) - transfers e-mail messages from client computers to an e-mail server
IMAP (Internet Mail Access Protocol) - an alternative to POP
TELNET (Telecommunications Network) - allows users who are logged on to one host to access another host
SSL (Secure Sockets Layer) - Provides secure data transfer over the Internet
Ethernet - broadcasts data packets to all networks is accepted only by the device to which it is addressed
CSMA/CD Protocol (Carrier Senese Multiple Access with Collision Detection) - takes care of situation in which two network devices attempt to transmit packets at the same time
Uplink Port - simple step up from a basic single-humb network is to connect several hubs
Wi-Fi Network - transmits data as radio waves over predefined frequencies, much like cordless phones.
War Driving/LAN-Jacking - occurs when hackers cruise around with a Wi-Fi equipped notebook computer that is set up to search for Wi-Fi signals coming from home or corporate Wi-Fi networks. War drivers can access and use unsecured Wi-Fi networks
WEP (Wired Equivalent Privacy) - essential step in making Wi-Fi-transmitted data useless to intruders
Wi-Fi card - transmitter, receiver, and antenna to transmit signals
Wireless Access Point - provides a central point for data transmitted over a wireless network by broadcasting signals to any devices with compatible Wi-Fi cards
Bluetooth - short-range wireless network technology that is designed to make its own connections between electronic devices - without wires, cables or any direct action from a user
Network Service Providers (NSPs) - such as AT&T, backbone links and routers are maintained by NSPs
ISP (Internet Service Provider) - operates network devices that handle the physical aspect of transmitting and receiving data from your computer
Ping - (Packet Internet Grouper) - sends a signal to a specific Internet address and waits for a reply.
Traceroute - records packet's path, including intermediate routers from your computer to its destination
Domain name- An easy to remeber name that translates into a computer IP address
Top level domain- ex: ".com" ".org" ".edu" .com would imply the host name is owned by a commercial busniess
Voiceband modem- Usually refferred to as a modem, converts the digital signals from your computer into signals that can travel through telephone lines.
DSL(Digital Subscriber Line)- a high speed, digital, always on internet access technology that uses standard phonelines to transport data
ISDN (Integrated Services Digital Network)- connections move data faster that a dial-up connection, but not as fast as DSL or cable modems
DOCSIS (Date over cable service interface specification)- a security technology that filters packets to certain ports, including the port the windows operating system uses for network
Bandwidth- a communications channel like your CATV cable carries packets at a constant speed
DSS (digital sattellite servcie)- uses a geosynchronous or low-earth sattellite to transmit television, voice, or computer data directly to and from a sattelite dish or base station owned or leased by an individual
WAP (Wireless access protocol)- a communications protocol that provides wireless internet access from handheld devices, such as cell phones and pda's
From the slides:
ALL keywords and definitions from the slides.
Notable Examples:
Things from the PDF of import:
Protocols - rules that ensure the orderly and accurate transmission and reception of data; start and end transmission, recognize error, sent data at the appropriate speed, and identify the correct senders and recipients
Handshaking - protocols helps help network devices negotiate and establish communications
Packets - the process by which you send a file or an e-mail over a network,the file is actually broken up into small pieces. It is a "parcel" of dad that is sent across a computer network
Packet Switching - the technology of dividing a message into several packets that can be routed or independently to their destination to avoid out-of-service or congested links
Circuit Switching - establishes a dedicated, private link between one telephone and another for the duration of a call; more efficient alternative to circuit switching
TCP/IP (Transmission Control Protocol/Internet Protocol) - breaks messages into packets and addresses them for the transmission over the Internet
HTTP (Hypertext Transfer Protocol) - Exchanges information over the web
FTP (File Transfer Protocol) - Transfers files between local and remote host computers
POP (Post Office Protocol) - Transfers mail from an e-mail server to a client inbox
SMTP (Simple Mail Transfer Protocol) - transfers e-mail messages from client computers to an e-mail server
IMAP (Internet Mail Access Protocol) - an alternative to POP
TELNET (Telecommunications Network) - allows users who are logged on to one host to access another host
SSL (Secure Sockets Layer) - Provides secure data transfer over the Internet
Ethernet - broadcasts data packets to all networks is accepted only by the device to which it is addressed
CSMA/CD Protocol (Carrier Senese Multiple Access with Collision Detection) - takes care of situation in which two network devices attempt to transmit packets at the same time
Uplink Port - simple step up from a basic single-humb network is to connect several hubs
Wi-Fi Network - transmits data as radio waves over predefined frequencies, much like cordless phones.
War Driving/LAN-Jacking - occurs when hackers cruise around with a Wi-Fi equipped notebook computer that is set up to search for Wi-Fi signals coming from home or corporate Wi-Fi networks. War drivers can access and use unsecured Wi-Fi networks
WEP (Wired Equivalent Privacy) - essential step in making Wi-Fi-transmitted data useless to intruders
Wi-Fi card - transmitter, receiver, and antenna to transmit signals
Wireless Access Point - provides a central point for data transmitted over a wireless network by broadcasting signals to any devices with compatible Wi-Fi cards
Bluetooth - short-range wireless network technology that is designed to make its own connections between electronic devices - without wires, cables or any direct action from a user
Network Service Providers (NSPs) - such as AT&T, backbone links and routers are maintained by NSPs
ISP (Internet Service Provider) - operates network devices that handle the physical aspect of transmitting and receiving data from your computer
Ping - (Packet Internet Grouper) - sends a signal to a specific Internet address and waits for a reply.
Traceroute - records packet's path, including intermediate routers from your computer to its destination
Domain name- An easy to remeber name that translates into a computer IP address
Top level domain- ex: ".com" ".org" ".edu" .com would imply the host name is owned by a commercial busniess
Voiceband modem- Usually refferred to as a modem, converts the digital signals from your computer into signals that can travel through telephone lines.
DSL(Digital Subscriber Line)- a high speed, digital, always on internet access technology that uses standard phonelines to transport data
ISDN (Integrated Services Digital Network)- connections move data faster that a dial-up connection, but not as fast as DSL or cable modems
DOCSIS (Date over cable service interface specification)- a security technology that filters packets to certain ports, including the port the windows operating system uses for network
Bandwidth- a communications channel like your CATV cable carries packets at a constant speed
DSS (digital sattellite servcie)- uses a geosynchronous or low-earth sattellite to transmit television, voice, or computer data directly to and from a sattelite dish or base station owned or leased by an individual
WAP (Wireless access protocol)- a communications protocol that provides wireless internet access from handheld devices, such as cell phones and pda's